Unrated severityNVD Advisory· Published Jan 24, 2018· Updated Aug 5, 2024
CVE-2017-15135
CVE-2017-15135
Description
It was found that 389-ds-base since 1.3.6.1 up to and including 1.4.0.3 did not always handle internal hash comparison operations correctly during the authentication process. A remote, unauthenticated attacker could potentially use this flaw to bypass the authentication process under very rare and specific circumstances.
Affected products
4- osv-coords3 versionspkg:rpm/opensuse/389-ds&distro=openSUSE%20Leap%2015.0pkg:rpm/suse/389-ds&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015pkg:rpm/suse/389-ds&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP1
< 1.4.0.3-lp150.3.3.1+ 2 more
- (no CPE)range: < 1.4.0.3-lp150.3.3.1
- (no CPE)range: < 1.4.0.3-4.7.52
- (no CPE)range: < 1.4.0.3-4.7.52
- Red Hat, Inc./389-ds-basev5Range: since 1.3.6.1 up to and including 1.4.0.3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- lists.opensuse.org/opensuse-security-announce/2019-05/msg00033.htmlmitrevendor-advisoryx_refsource_SUSE
- access.redhat.com/errata/RHSA-2018:0414mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2018:0515mitrevendor-advisoryx_refsource_REDHAT
- www.securityfocus.com/bid/102811mitrevdb-entryx_refsource_BID
- bugzilla.redhat.com/show_bug.cgimitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.